×

USER-CONVENIENT AUTHENTICATION METHOD AND APPARATUS USING A MOBILE AUTHENTICATION APPLICATION

  • US 20140040628A1
  • Filed: 08/02/2013
  • Published: 02/06/2014
  • Est. Priority Date: 08/03/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method for securing interaction with an application by a user who remotely accesses said application through an access device that is connected to an application server hosting said application, comprising the steps of:

  • at a user authentication device capturing a signal emitted by the access device, said signal encoded with an authentication initiating message, said authenticating initiating message comprising at least an application identifier corresponding to an identity of the application;

    at the user authentication device decoding said signal and obtaining the authentication initiating message;

    at the user authentication device retrieving from the authentication initiating message the application identifier;

    at the user authentication device using the application identifier to obtain a human interpretable representation of the application identity and presenting the obtained application identity representation to the user using a user output interface of the user authentication device;

    at the user authentication device obtaining from the user, using a user input interface of the user authentication device, an approval for generating a response message and making the response message available to a verification server;

    at the user authentication device generating a dynamic security value using a first cryptographic algorithm parameterized with a cryptographic dynamic security value generation key and using at least one personalized data element that is associated with the particular user or the particular user authentication device, wherein the generated dynamic security value is cryptographically linked to the application identity presented to the user;

    at the user authentication device generating a response message comprising at least the generated dynamic security value;

    making the generated response message available to a verification server;

    at the verification server receiving the response message;

    verifying the response message including verifying the validity of the dynamic security value;

    communicating the result of the verification of the response message to the application.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×